Extending Attack Graph-Based Security Metrics and Aggregating Their Application
Found in:
IEEE Transactions on Dependable and Secure Computing
By Nwokedi Idika,Bharat Bhargava
Issue Date:January 2012
pp. 75-85
The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-...

The Probabilistic Provenance Graph
Found in:
2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Nwokedi Idika,Mayank Varia,Harry Phan
Issue Date:May 2013
pp. 34-41
Previous provenance models have assumed that there is complete certainty in the provenance relationships. But what if this assumption does not hold? In this work, emaiwe propose a probabilistic provenance graph (PPG) model to characterize scenarios where p...